MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24db339561617aedc6ff3205eb583a77d97258ab1474f121e6aa00c81f827ac8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 24db339561617aedc6ff3205eb583a77d97258ab1474f121e6aa00c81f827ac8
SHA3-384 hash: d1ff14fcbc5b8e4e75e94a38b918dddba8004cb5c503f2135df8c6a11e5972cce43ee2ba4905cc837a4d8a69f777a574
SHA1 hash: d2930ed1367c254204fc14531a919d91223cf0e9
MD5 hash: 1a6e80fd1d84d565317482e2073473f1
humanhash: solar-virginia-uranus-papa
File name:24db339561617aedc6ff3205eb583a77d97258ab1474f121e6aa00c81f827ac8
Download: download sample
Signature Quakbot
File size:1'241'600 bytes
First seen:2022-03-08 02:49:28 UTC
Last seen:2022-03-08 04:37:55 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e554ea92ebe41ee1e40fc6602304919b (1 x Quakbot)
ssdeep 24576:Hn/Qx7oK7uM5hBd//NlV5teB45XyiCkqm9u8U2SAHl4XoWSIgX4T:H//yv15pnJuBKKgX4T
Threatray 143 similar samples on MalwareBazaar
TLSH T1C3458C23F6A1483AC1662F399D3B57658C7A7A017D24F4C63AE41D8C4B3768379263E3
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter malwarelabnet
Tags:dll obama164 Qakbot Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
218
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Launching a process
Sending a custom TCP request
Searching for synchronization primitives
Creating a window
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.QBot
Status:
Malicious
First seen:
2022-03-08 02:50:13 UTC
File Type:
PE (Dll)
Extracted files:
40
AV detection:
22 of 27 (81.48%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama164 campaign:1646668144 banker stealer trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Qakbot/Qbot
Malware Config
C2 Extraction:
136.143.11.232:443
172.114.160.81:443
82.152.39.39:443
72.27.73.206:443
70.46.220.114:443
83.110.75.102:995
144.202.2.175:995
2.50.27.78:443
31.35.28.29:443
190.189.33.6:32101
75.159.9.236:443
191.112.19.94:443
70.51.139.125:2222
89.211.185.240:2222
76.70.9.169:2222
67.209.195.198:443
120.150.218.241:995
217.128.122.65:2222
38.70.253.226:2222
72.12.115.90:22
86.98.11.110:443
92.99.229.158:2222
173.21.10.71:2222
32.221.231.1:443
96.246.158.154:995
210.246.4.69:995
186.10.247.110:443
89.101.97.139:443
176.57.126.138:443
45.9.20.200:443
182.191.92.203:995
72.252.201.34:990
96.21.251.127:2222
187.170.7.81:443
63.153.150.20:443
70.163.1.219:443
80.11.74.81:2222
217.165.122.227:61200
74.15.2.252:2222
72.252.201.34:995
209.210.95.228:32100
100.1.108.246:443
191.99.191.28:443
80.14.188.219:2222
93.48.80.198:995
190.73.3.148:2222
40.134.247.125:995
103.87.95.131:2222
176.45.231.184:995
207.170.238.231:443
108.4.67.252:443
81.229.130.188:443
144.202.2.175:443
187.59.18.65:443
197.164.168.41:993
91.177.173.10:995
86.195.158.178:2222
140.82.49.12:443
176.67.56.94:443
66.230.104.103:443
39.52.217.44:995
172.114.160.81:995
208.101.87.135:443
47.180.172.159:443
31.215.70.101:443
75.99.168.194:443
41.228.22.180:443
183.82.103.213:443
92.177.45.46:2078
24.43.99.75:443
217.165.79.31:443
24.178.196.158:2222
181.118.183.94:443
117.248.109.38:21
173.174.216.62:443
39.49.41.67:995
105.186.100.243:995
47.23.89.61:993
47.23.89.61:995
173.170.224.168:995
86.97.209.65:1194
103.51.26.157:995
75.99.168.194:61201
84.241.8.23:32103
217.165.79.31:995
70.57.207.83:443
24.55.67.176:443
69.159.200.138:2222
103.139.242.30:990
189.253.32.61:995
45.241.205.209:995
39.44.152.168:995
197.89.109.129:443
120.61.0.154:443
217.165.85.106:993
217.165.68.124:32101
196.89.146.133:443
144.86.64.220:443
124.41.193.166:443
197.37.66.133:995
5.95.58.211:2087
78.96.235.245:443
118.161.37.138:443
141.237.140.181:995
118.189.242.45:2083
76.23.237.163:995
119.158.105.8:995
176.253.27.51:443
118.161.37.138:995
103.139.242.30:993
180.183.100.147:2222
39.52.74.228:995
41.84.240.132:443
31.56.32.238:995
208.107.221.224:443
121.74.187.191:995
89.137.52.44:443
175.145.235.37:443
75.188.35.168:443
128.106.123.103:443
76.25.142.196:443
175.198.36.46:443
78.100.194.138:6883
102.140.70.49:443
71.74.12.34:443
73.151.236.31:443
45.46.53.140:2222
63.143.92.99:995
89.86.33.217:443
109.12.111.14:443
105.184.88.252:995
86.198.170.170:2222
101.50.110.176:995
98.96.186.171:995
86.131.118.124:443
5.32.41.46:443
103.133.200.138:443
76.69.155.202:2222
47.180.172.159:50010
67.165.206.193:993
189.146.51.56:443
41.84.236.26:995
76.169.147.192:32103
92.98.42.231:2222
197.2.235.27:443
103.230.180.119:443
196.203.37.215:80
114.79.148.170:443
43.252.72.97:2222
203.109.95.139:443
Unpacked files
SH256 hash:
7641f20774b08f8b17a7a23c6c7cdd719d43ea74a4db807a0195a5a47e7f7eb3
MD5 hash:
9f8256ce9ee920c2f39ca915527523f3
SHA1 hash:
cf035edfc1d34c0b49dcca399febc816fb5fabc9
SH256 hash:
237173781e008e254a50591b1468a9303d46418396b7d2e4e8413e9f57294216
MD5 hash:
70b13c231be143645b10ce2e491e4a4c
SHA1 hash:
ed2eff2085bdfc4709463b1b37666104903c985b
SH256 hash:
24db339561617aedc6ff3205eb583a77d97258ab1474f121e6aa00c81f827ac8
MD5 hash:
1a6e80fd1d84d565317482e2073473f1
SHA1 hash:
d2930ed1367c254204fc14531a919d91223cf0e9
Malware family:
CryptOne
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments